jhfry writes “An interesting development by an unexpected source, Phoenix Technologies is releasing a Linux based, virtualization enabled, BIOS based OS for computers. They implemented a full Linux distro right on the BIOS chips, and using integrated virtualization technology it ‘allows PCs and laptops to hot-switch between the main operating system, such as Windows, and the HyperSpace environment.’ So essentially they are ‘trying to create a new market using the ideas of a fast-booting, safe platform that people can work in, but remain outside of Windows.'”

ausekilis sends us to DarkReading for the news that auditors have identified thousands of vulnerabilities in the FAA’s Web-based air traffic control applications — 763 of them high-risk. Here is the report on the Department of Transportation site (PDF). “And the FAA’s Air Traffic Organization, which heads up ATC operations, received more than 800 security incident alerts in fiscal 2008, but still had not fixed 17 percent of the flaws that caused them, ‘including critical incidents in which hackers may have taken over control of ATO computers,’ the report says. … While the number of serious flaws in the FAA’s apps appears to be staggering, Jeremiah Grossman, CTO of WhiteHat Security, says the rate is actually in line with the average number of bugs his security firm finds in most Web applications. … Auditors were able to hack their way through the Web apps to get to data on the Web application and ATC servers, including the FAA’s Traffic Flow Management Infrastructure system, Juneau Aviation Weather System, and the Albuquerque Air Traffic Control Tower. They also were able to gain entry into an ATC system that monitors power, according to the report. Another vulnerability in the FAA’s Traffic Flow Management Infrastructure leaves related applications open to malware injection.”

Hugh Pickens writes “A team of Army cadets spent four days at West Point last week struggling around the clock to keep a computer network operating while hackers from the National Security Agency tried to infiltrate it with methods that an enemy might use. The NSA made the cadets’ task more difficult by planting viruses on some of the equipment, just as real-world hackers have done on millions of computers around the world. The competition was a final exam for computer science and information technology majors, who competed against teams from the Navy, Air Force, Coast Guard and Merchant Marine as well as the Naval Postgraduate Academy and the Air Force Institute of Technology. Ideally, the teams would be allowed to attack other schools’ networks while also defending their own but only the NSA, with its arsenal of waivers, loopholes, special authorizations is allowed to take down a US network. NSA tailored its attacks to be just ‘a little too hard for the strongest undergraduate team to deal with, so that we could distinguish the strongest teams from the weaker ones.’ The winning West Point team used Linux, instead of relying on proprietary products from big-name companies like Microsoft or Sun Microsystems.”

brothke writes “In The Road to Big Brother: One Man’s Struggle Against the Surveillance Society, Ross Clark journals his struggles to avoid the myriad CCTV cameras in his native England. That’s difficult given the millions of cameras in public locations there. Before going forward, the use of the term ‘Big Brother’ in both the title and throughout the book is erroneous. Big Brother has its roots in George Orwell’s novel 1984 and refers to an omnipresent, seemingly benevolent figure representing the oppressive control over individual lives exerted by an authoritarian government. The term has been misappropriated to describe everything from legitimate crime-fighting, to surveillance cameras, to corporate e-mail and network usage monitoring. Localities that deploy CCTV cameras in public thoroughfares in the hope of combating crime are in no way indicative of the oppressive control of Orwell’s Big Brother. Should we be concerned that such a scenario play itself out in Ross Clark’s UK or in the US? Likely no, as US government agencies are widely decentralized and isolated. Just getting the networks within a single federal agency unified is a daunting task; getting all of the agencies to have a single unified data sharing mechanism is a pipe-dream. Look at it this way: the US Department of Defense has more networks than some countries have computers.” Read below for the rest of Ben’s review.

Hackers broke into University of California, Berkeley’s health services center computer and potentially stole the personal information of more than 160,000 students, alumni, and others, the university announced Friday.

PL/SQL Guy writes “Hackers have repeatedly broken into the air traffic control mission-support systems of the US Federal Aviation Administration, according to an Inspector General report sent to the FAA this week, and the FAA’s increasing use of commercial software and Internet Protocol-based technologies as part of an effort to modernize the air traffic control systems poses a higher security risk to the systems than when they relied primarily on proprietary software, the report said. Intrusion detection systems (IDS) are deployed at only 11 of hundreds of air traffic control facilities. In 2008, more than 870 cyber incident alerts were issued to the organization responsible for air traffic control operations and by the end of the year 17 percent (more than 150 incidents) had not been remediated, ‘including critical incidents in which hackers may have taken over control’ of operations computers, the report said.”

Frequent Slashdot contributor Bennett Haselton writes with his idea for mass adoption of anti-virus software: “If the US government did more to encourage people to keep their computers secure — by buying TV ads to publicize free private-sector anti-virus programs, or subsidizing the purchase of anti-virus software — we’d all be better off, on average. That’s not just idealistic nanny-statism, but something you can argue mathematically, to the point where even some libertarians would agree.” Read on for the rest of Bennett’s thoughts.

Probably – for now. The internet is a disparate mix of interconnected computers, many of them on large networks run by universities, businesses and so on. What unites this network of networks are the communication languages known as the Transmission Control Protocol and the Internet Protocol, collectively TCP/IP.